Users can define policy to control traffic flow between which two components?()A、from a zone to the device itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface

题目

Users can define policy to control traffic flow between which two components?()

  • A、from a zone to the device itself
  • B、from a zone to the same zone
  • C、from a zone to a different zone
  • D、from one interface to another interface

相似考题

1.WWW is popular for its multimedia transmission and friendly(71). Although the speed of network has been improved considerably in recent years, the rapid(72)of using the Internet, the inherited character of delay in the network and the Request/Response working mode of WWW still make the Internet traffic very(73)and give no guarantee on the Quality of Service. Because HTTP has no states, the web server cannot know the users' demand and the users' requests cannot be predicted Taking advantage of a cache mechanism and the time locality of WWW accesses, the browser can preserve the documents ever accessed in the local machine. By this means, for the documents in the local cache, the browser does not need to send the requests to the remote server or to receive the whole responses from the remote one Pre-fetching uses the space locality of accesses First, the users' access requests are predicted according to the users' current request. Secondly, the expected pages are fetched into the local cache when the user is brow sing the current page. Finally, the users can access these pages downloaded from the local cache. And this can reduce the access delay to some degrees. Pre-fetching is one kind of active caches that can cache the pages which are still not requested by the user. The application of pre-fetching technology in the web can greatly reduce the waiting time after users have sent their requests. This paper brings forward an intelligent technique of web pre-fetching, which can speed up fetching web pages. In this technique, we use a simplified WWW data model to represent the data in the cache of web browser to mine the association rules. We store these rules in a knowledge base so as to(74)the user's actions. In the client sides, the agents are responsible for mining the users' interest and pre-fetching the web pages, which are based on the interest association repository. Therefore it is(75)for the users to speed up the browsing.A.interactiveB.interactionC.interactivityD.infection

更多“Users can defineQ”相关问题
  • 第1题:

    A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()

    • A、the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor group
    • B、the user can see all the users except those in the Admin group, but can only modify the user’s own account
    • C、the user can see only the user’s own account, and cannot modify it
    • D、the user can see only the user’s own account, and can change the password only

    正确答案:D

  • 第2题:

    Which of the following network protocols is needed to ensure that users can type in a FQDN instead of the IP address?()

    • A、DNS
    • B、FTP
    • C、WINS
    • D、IMAP4

    正确答案:A

  • 第3题:

    Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()

    • A、It can be used to allow the access privilege settings for users but not roles.
    • B、It can be used to allow the access privilege settings for users as well as roles.
    • C、It can be used to control the time interval for which the access privilege is available to a user.
    • D、It can be used to selectively restrict the access for each user in a database to different host computers.
    • E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

    正确答案:B,C,D

  • 第4题:

    You are implementing an ASP.NET MVC 2 Web application that allows users to view and edit data. You need to ensure that only logged-in users can access the Edit action of the controller. What are two possible attributes that you can add to the Edit action to achieve this goal? ()

    • A、[Authorize(Users = "")]
    • B、[Authorize(Roles = "")]
    • C、[Authorize(Users = "*")]
    • D、[Authorize(Roles = "*")]

    正确答案:A,B

  • 第5题:

    Which result or results do these actions produce?()

    • A、Users in both departments can access their files from the network.
    • B、Users in the accounting department can view the legal department’s documents.
    • C、Users in the legal department cannot view the accounting department’s documents.
    • D、Company managers can access and modify both departments’ files.

    正确答案:A,C,D

  • 第6题:

    单选题
    ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.  Which statement is true regarding the ACL created?()
    A

     It is a list of remote database links stored in the XML file that are available to the users of the database.

    B

     It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.

    C

     It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.

    D

     It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.


    正确答案: A
    解析: 暂无解析

  • 第7题:

    多选题
    You are implementing an ASP.NET MVC 2 Web application that allows users to view and edit data. You need to ensure that only logged-in users can access the Edit action of the controller. What are two possible attributes that you can add to the Edit action to achieve this goal? ()
    A

    [Authorize(Users = )]

    B

    [Authorize(Roles = )]

    C

    [Authorize(Users = *)]

    D

    [Authorize(Roles = *)]


    正确答案: C,D
    解析: 暂无解析

  • 第8题:

    单选题
    A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()
    A

    the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor group

    B

    the user can see all the users except those in the Admin group, but can only modify the user’s own account

    C

    the user can see only the user’s own account, and cannot modify it

    D

    the user can see only the user’s own account, and can change the password only


    正确答案: D
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements are true when using the configure exclusive CLI command?()
    A

    Multiple users can enter configuration mode and have their own private configuration.

    B

    When a user commits, only the user's changes are committed.

    C

    A message indicates which other users are in configuration mode and what portion of the configuration they are editing.

    D

    Only a single user can edit the configuration.


    正确答案: A,B
    解析: 暂无解析

  • 第10题:

    单选题
    View the Exhibit and examine the privileges granted to the MGR_ROLE role. The user SKD has been grantedthe CONNECT and RESOURCE roles only. The database administrator (DBA) grants MGR_ROLE to the userSKD by executing the command: SQL> GRANT MGR_ROLE TO SKD WITH ADMIN OPTION;  Which statement is true about the user SKD afterhe/she is granted this role()
    A

    The user SKD can grant only the MGR_ROLE role to other users, but not the privileges in it.

    B

    The user SKD can revoke the MGR_ROLE only from the users for whom he/she is the grantor.

    C

    The user SKD can grant the privileges in the MGR_ROLE role to other users, but not with ADMIN OPTION.

    D

    The user SKD can grant the privileges in the MGR_ROLE role to other users, but cannot revoke privilegesfrom them


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements accurately describe a role?()
    A

    A role can be given to a maximum of 1000 users.

    B

    A user can have access to a maximum of 10 roles.

    C

    A role can have a maximum of 100 privileges contained in it.

    D

    Privileges are given to a role by using the CREATE ROLE statement.

    E

    A role is a named group of related privileges that can be granted to the user.

    F

    A user can have access to several roles, and several users can be assigned the same role.


    正确答案: F,D
    解析: 暂无解析

  • 第12题:

    单选题
    Some computer companies started charging helpline users because______.
    A

    the companies wanted to increase profits.

    B

    more and more PCs are sold to homes.

    C

    many users don’t refer to the manual.

    D

    only technicians can solve their problems.


    正确答案: B
    解析:
    推断题文章第四段尾句提到,电话量太大以致于很多公司都开始对热线收费,第五段首句又谈到,那些问题都简单到只需打开说明书一看便可解决,之后又接着列举了用户不愿意读说明书的例子。由此可见,正是由于用户不愿意看说明书才使热线电话大量增加,选项C与之相符。A项在文中没有提及;B项与题干无关;而D项和文章内容相悖,故这三项均可排除。故答案为C项。

  • 第13题:

    Which of the following is true regarding NetWare Directory Services (NDS) configuration?()

    • A、Remote users can access the tree through dial-in connections.
    • B、Mobile users do not require changing the NDS name context.
    • C、Remote users do not require a special NDS object entry.
    • D、There are no differences between mobile users and remote users.

    正确答案:A

  • 第14题:

    Which of the following roles can use the Organization Administration Console to create and modify users in their organization?()

    • A、Buyer Administrator
    • B、Site Administrator
    • C、Seller
    • D、Seller Administrator
    • E、Store Administrator

    正确答案:A,B,D

  • 第15题:

    You are unable to move the Unified Job Scheduler occupant from the SYSAUX tablespace to the USERS tablespace. What could be the reason?()

    • A、None of the SYSAUX occupants can be relocated.
    • B、The USERS tablespace is a bigfile tablespace (BFT).
    • C、The united Job Scheduler occupant cannot be relocated.
    • D、The SYSAUX occupants can be relocated to the SYSTEM tablespace only.

    正确答案:C

  • 第16题:

    You have an Exchange Server 2010 organization.  You plan to provide users with the ability to schedule meetings.  You need to recommend a scheduling solution that meets the following requirements: .Ensures that users can schedule conference rooms for meetings .Ensures that conference room owners can change the settings of meetings scheduled by users  What should you include in the solution?()

    • A、Managed Folder Assistant
    • B、public folders
    • C、resource mailboxes
    • D、room list distribution groups

    正确答案:C

  • 第17题:

    You have an Exchange Server 2010 organization.Users report that they can share free/busy information with users at a federated partner, but they cannot share contacts with those users. You need to ensure that your users can share contacts with users at the federated partner.  What should you modify?()

    • A、the Federation Trust
    • B、the EWS virtual directory
    • C、the default sharing policy
    • D、the Organizational Relationship

    正确答案:C

  • 第18题:

    多选题
    When configuring a DHCP server, which of the following can the administrator define for DHCP users?()
    A

    Database server

    B

    NTP server

    C

    DHCP server

    D

    SQLServer

    E

    DNS server

    F

    Domain name


    正确答案: F,B
    解析: 暂无解析

  • 第19题:

    单选题
    You have an Exchange Server 2010 organization.Users report that they can share free/busy information with users at a federated partner, but they cannot share contacts with those users. You need to ensure that your users can share contacts with users at the federated partner.  What should you modify?()
    A

    the Federation Trust

    B

    the EWS virtual directory

    C

    the default sharing policy

    D

    the Organizational Relationship


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    You are unable to move the Unified Job Scheduler occupant from the SYSAUX tablespace to the USERS tablespace. What could be the reason?()
    A

    None of the SYSAUX occupants can be relocated.

    B

    The USERS tablespace is a bigfile tablespace (BFT).

    C

    The united Job Scheduler occupant cannot be relocated.

    D

    The SYSAUX occupants can be relocated to the SYSTEM tablespace only.


    正确答案: C
    解析: 暂无解析

  • 第21题:

    多选题
    Which of the following is true about the following share access properties? ()
    A

    +managers will be resolved as a Winbind group.

    B

    The timo and taki users can manipulate files regardless of the file system permissions.

    C

    +managers will be resolved as a Unix group.

    D

    +managers is a builtin default Samba group.

    E

    The admin users can be applied only to print shares.


    正确答案: B,C
    解析: 暂无解析

  • 第22题:

    单选题
    You have created a password file using the following command:   ORAPWD file=d:/oracle/ora9i/orapwU01 password=change_on_install entries=3   Which of the following is true about this password file?()
    A

     If the REMOTE_LOGIN_PASSWORDFILE parameter is set to SHARED in the initialization parameter file, then a maximum of three users can be granted the SYSDBA or SYSOPER privileges.

    B

     If the REMOTE_LOGIN_PASSWORDFILE parameter is set to EXCLUSIVE in the initialization parameter file, then a maximum of three users can be granted the SYSDBA or SYSOPER privileges.

    C

     If the REMOTE_LOGIN_PASSWORDFILE parameter is set to SHARED in the initialization parameter file, then the SYSDBA and SYSOPER privileges can be granted to other users as long as space in the password file is

    D

     If the REMOTE_LOGIN_PASSWORDFILE parameter is set to EXCLUSIVE in the initialization parameter file, then the SYSDBAand SYSOPER privileges can be granted to other users as long as space in the password file is available.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()
    A

    It can be used to allow the access privilege settings for users but not roles.

    B

    It can be used to allow the access privilege settings for users as well as roles.

    C

    It can be used to control the time interval for which the access privilege is available to a user.

    D

    It can be used to selectively restrict the access for each user in a database to different host computers.

    E

    It can be used to selectively restrict a user's access to different applications in a specific host computer.


    正确答案: D,B
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following is true regarding NetWare Directory Services (NDS) configuration?()
    A

    Remote users can access the tree through dial-in connections.

    B

    Mobile users do not require changing the NDS name context.

    C

    Remote users do not require a special NDS object entry.

    D

    There are no differences between mobile users and remote users.


    正确答案: A
    解析: 暂无解析